CN110263015A - Data source tracing method, device, equipment and readable storage medium storing program for executing based on block chain - Google Patents

Data source tracing method, device, equipment and readable storage medium storing program for executing based on block chain Download PDF

Info

Publication number
CN110263015A
CN110263015A CN201910377821.XA CN201910377821A CN110263015A CN 110263015 A CN110263015 A CN 110263015A CN 201910377821 A CN201910377821 A CN 201910377821A CN 110263015 A CN110263015 A CN 110263015A
Authority
CN
China
Prior art keywords
data
source
target
record
terminal
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201910377821.XA
Other languages
Chinese (zh)
Inventor
张文明
谢丹力
贾牧
宦鹏飞
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
OneConnect Smart Technology Co Ltd
Original Assignee
OneConnect Smart Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by OneConnect Smart Technology Co Ltd filed Critical OneConnect Smart Technology Co Ltd
Priority to CN201910377821.XA priority Critical patent/CN110263015A/en
Publication of CN110263015A publication Critical patent/CN110263015A/en
Priority to PCT/CN2019/121719 priority patent/WO2020224247A1/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/21Design, administration or maintenance of databases
    • G06F16/219Managing data history or versioning
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/23Updating
    • G06F16/2365Ensuring data consistency and integrity
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/27Replication, distribution or synchronisation of data between databases or within a distributed database system; Distributed database system architectures therefor

Abstract

The present invention relates to block chain technical fields, provide a kind of data source tracing method, device, equipment and readable storage medium storing program for executing based on block chain.The present invention is corresponding to increase the data with incidence relation when executing data modification or delete operation to block chain data, to as the historical information of tracing to the source for modifying or deleting data;When needing to carry out data to trace to the source, the concrete operations record for having modified or having deleted data can be obtained according to this associated data, to solve the information Single-issue encountered when being traced to the source after data are modified or deleted, it realizes to the detailed record of block chain data variation, meets the data record demand under block chain service application.

Description

Data source tracing method, device, equipment and readable storage medium storing program for executing based on block chain
Technical field
The present invention relates to block chain technical field more particularly to a kind of data source tracing method based on block chain, device, set Standby and readable storage medium storing program for executing.
Background technique
Block chain can be regarded as a distributed account book, its essence is also a distributed database, and bottom can It is stored using the key value Key-Value database of a persistence.Currently, carrying out data and management using block chain technology It has begun and has gradually been applied in different practical business scenes.
But in practical business scene, the data that block chain itself carries are traced to the source, and there are drawbacks in certain drawback for function: The data of block chain are traced to the source function, can only be recorded a certain data and be modified or the deleted time, the information of the record is single, such as One data of fruit block chain is modified or deleted, by block chain history account book only record this current data modified or It deletes and the time of data modification or deletion, operation information of without nothing other is not able to satisfy actual business demand.
Summary of the invention
The main purpose of the present invention is to provide a kind of data source tracing method based on block chain, device, equipment and readable Storage medium, it is intended to solve record information single technical problem when existing block chain data are deleted or modify.
To achieve the above object, the present invention provides a kind of data source tracing method based on block chain, described to be based on block chain Data source tracing method include:
In the data modification for receiving first terminal transmission/deletion instruction, looked into according to the data modification/deletion instruction The target keywords of corresponding target data are ask, and the execution of the target keywords corresponding target value is modified and is operated/to described Target keywords execute delete operation;
Uniquely corresponding historical keyword and history value, the history value include the mesh with the target keywords for generation The operating instruction information of data is marked, and block chain is gone through according to the historical keyword and the modification operation/delete operation Records of the Historian record carries out record update;
Receive second terminal transmission based on the target keywords trace to the source inquiry instruction when, traced to the source according to described Inquiry instruction inquires the historical record, and obtains the corresponding keyword of the target keywords according to the historical record and remember Record;
The historical keyword is obtained according to the keyword record and the target keywords, and is closed according to the history Key word is inquired to obtain the history value;
Corresponding data are returned to the second terminal according to the keyword record and the history value to trace to the source information.
In addition, to achieve the above object, trace to the source device the present invention also provides a kind of data based on block chain, it is described to be based on The data of block chain device of tracing to the source includes:
Removing module is modified, when for instructing in the data modification/deletion for receiving first terminal transmission, according to the number The target keywords of target data are corresponded to according to modification/deletion instructions query, and the corresponding target value of the target keywords is held Row modification operation/delete operation is executed to the target keywords;
Update module is recorded, for generating and the target keywords uniquely corresponding historical keyword and history value, institute The operating instruction information that history value includes the target data is stated, and operates/deletes according to the historical keyword and the modification Except operation carries out record update to the historical record of block chain;
First enquiry module, for referring in the inquiry of tracing to the source based on the target keywords for receiving second terminal transmission When enabling, the historical record is inquired according to the inquiry instruction of tracing to the source, and the target critical is obtained according to the historical record The corresponding keyword record of word;
Second enquiry module, for obtaining the history keyword according to the keyword record and the target keywords Word, and inquired to obtain the history value according to the historical keyword;
Information return module is corresponded to for being returned according to the keyword record and the history value to the second terminal Data trace to the source information.
In addition, to achieve the above object, trace to the source equipment the present invention also provides a kind of data based on block chain, it is described to be based on The data of block chain equipment of tracing to the source includes processor, memory and is stored on the memory and can be by the processor The data of execution are traced to the source program, when wherein the data are traced to the source, program is executed by the processor, are realized as above-mentioned based on area The step of data source tracing method of block chain.
In addition, to achieve the above object, the present invention also provides a kind of readable storage medium storing program for executing, being deposited on the readable storage medium storing program for executing It contains data to trace to the source program, when program is executed by processor wherein the data are traced to the source, realize such as the above-mentioned chain based on block The step of data source tracing method.
The present invention is corresponding to increase by one with association pass when executing data modification or delete operation to block chain data The data of system, to as the historical information of tracing to the source for modifying or deleting data;It, can be according to this when needing to carry out data to trace to the source Associated data obtains the concrete operations record for having modified or having deleted data, thus solve to need after data are modified or deleted into The information Single-issue that row encounters when tracing to the source is realized to the detailed record of block chain data variation, meets block chain business and answer Data record demand under.
Detailed description of the invention
Fig. 1 be the embodiment of the present invention involved in the data based on block chain trace to the source equipment hardware configuration signal Figure;
Fig. 2 is that the present invention is based on the flow diagrams of the data source tracing method first embodiment of block chain;
Fig. 3 be Fig. 2 described in receive first terminal transmission data modification/deletion instruction when, repaired according to the data Change/delete the target keywords that instructions query corresponds to target data, and the execution of the target keywords corresponding target value is repaired Change operation/to the target keywords execute delete operation refinement flow diagram;
Fig. 4 be Fig. 2 described in receive second terminal transmission based on the target keywords trace to the source inquiry instruction when, The historical record is inquired according to the inquiry instruction of tracing to the source, and the target keywords are obtained according to the historical record and are corresponded to Keyword record refinement flow diagram;
Fig. 5 is the functional block diagram of device first embodiment of tracing to the source the present invention is based on the data of block chain.
The embodiments will be further described with reference to the accompanying drawings for the realization, the function and the advantages of the object of the present invention.
Specific embodiment
It should be appreciated that the specific embodiments described herein are merely illustrative of the present invention, it is not intended to limit the present invention.
The present embodiments relate to the data source tracing method based on block chain be mainly used in the data based on block chain It traces to the source equipment, which can be personal computer, server, mobile phone, tablet computer, palm PC etc. with data processing function The equipment of energy.
Referring to Fig.1, Fig. 1 is that the data based on block chain involved in the embodiment of the present invention are traced to the source the hardware knot of equipment Structure schematic diagram.In the embodiment of the present invention, which may include (such as the central processing unit Central of processor 1001 Processing Unit, CPU), communication bus 1002, user interface 1003, network interface 1004, memory 1005.Wherein, Communication bus 1002 is for realizing the connection communication between these components;User interface 1003 may include display screen (Display), input unit such as keyboard (Keyboard);Network interface 1004 optionally may include that the wired of standard connects Mouth, wireless interface (such as Wireless Fidelity WIreless-FIdelity, WI-FI interface);Memory 1005 can be high speed and deposit at random Access to memory (random access memory, RAM), is also possible to stable memory (non-volatile memory), Such as magnetic disk storage, memory 1005 optionally can also be the storage device independently of aforementioned processor 1001.This field Technical staff is appreciated that hardware configuration shown in Fig. 1 and does not constitute a limitation of the invention, and may include more than illustrating Or less component, perhaps combine certain components or different component layouts.
With continued reference to Fig. 1, the memory 1005 in Fig. 1 as a kind of computer readable storage medium may include operation system System, network communication module and data are traced to the source program.In Fig. 1, network communication module is mainly used for connecting database, with data Library carries out data communication;And processor 1001 can call the data stored in memory 1005 to trace to the source program, and execute this hair The data source tracing method based on block chain that bright embodiment provides.
The embodiment of the invention provides a kind of data source tracing methods based on block chain.
It is that the present invention is based on the flow diagrams of the data source tracing method first embodiment of block chain referring to Fig. 2, Fig. 2.
In the present embodiment, the data source tracing method based on block chain the following steps are included:
Step S10, in the data modification for receiving first terminal transmission/deletion instruction, according to the data modification/delete Except instructions query corresponds to the target keywords of target data, and modification behaviour is executed to the corresponding target value of the target keywords Make/delete operation is executed to the target keywords;
Currently, carrying out data using block chain technology and managing to have begun gradually to be applied to different practical business fields Jing Zhong.But in practical business scene, the data that block chain itself carries are traced to the source, and there are drawbacks in certain drawback for function: block The data of chain are traced to the source function, can only be recorded a certain data and be modified or the deleted time, the information of the record is single, if area One data of block chain is modified or deleted, and is only recorded this current data by block chain history account book and is modified or deleted And the time of data modification or deletion, operation information of without nothing other, it is not able to satisfy actual business demand.In this regard, The present embodiment proposes a kind of data source tracing method based on block chain, is executing data modification or delete operation to block chain data When, it is corresponding to increase the data with incidence relation, to as the historical information of tracing to the source for modifying or deleting data;When need When carrying out data and tracing to the source, it can be obtained according to this associated data and modify or delete the concrete operations of data and record, thus Solve the information Single-issue encountered when being traced to the source after data are modified or deleted.
The data source tracing method based on block chain of the present embodiment is mainly used in block catenary system, the block catenary system It include several block chain nodes, these block chain nodes can be considered a distributed data base, and the database belongs to key It is worth (Key-Value) database;And service terminal can to some node send business transaction request, thus to block chain into The operations such as row data are newly-increased, data modification or data are deleted;For each block chain node, then can be by based on block chain Data equipment of tracing to the source realize its function, which can be personal computer, server, mobile phone, tablet computer, palm PC Deng;For convenience of description, which is illustrated by taking server as an example.
In the present embodiment, it is previously provided with intelligent contract in server (block chain node), intelligent contract is construed as The set of code and data;The intelligence contract can execute some functions automatically under the driving of time or event, such as can be in phase Information is transmitted between mutually, modifies the state (account information etc.) of block chain, and the complete calculating of figure spirit (can be accomplished with Turing machine All things, it is popular for be exactly all things that can do of general programming language).Each business participant of block chain can lead to It crosses respective service terminal and accesses corresponding block chain node, and send relevant business behaviour to the intelligent contract of block catenary system It instructs.When a certain business participant needs to modify to a certain data in block chain operation system or when delete operation, Data modification/deletion can be sent to server by a certain service terminal (such as PC, laptop, mobile phone, plate) to instruct (or sending data modification/deletion instruction to the intelligent contract of server).For convenience of description, the data modification/deletion is sent to refer to The service terminal of order can be described as first terminal.For the instruction of the data modification/deletion, modifies/delete including in need Operation object, the operation object can be described as target data.Since block chain bottom uses the key assignments (Key- an of persistence Value) database, therefore the target data in the data modification/deletion instruction can be in a manner of target keywords Key1 It is indicated.If such as carry out data deletion, then the data delete instruction in may include target data target keywords Key1;If carry out data modification, then the data modification instruction in may include target data target keywords Key1 and Concrete modification content.Server (intelligent contract) can extract the data and repair when receiving the data modification/deletion instruction Change/delete the target keywords Key1 in instruction, and inquire target keywords Key1 in block chain, then executes corresponding Operation: if data modification instructs, then it can further be inquired according to target keywords Key1 and obtain the target keywords The corresponding target value Value1 of Key1, and modify to target value Value1;If data delete instruction, then can be to the mesh It marks keyword Key1 and executes delete operation.
Certainly, the data modification/deletion is instructed, can also include other contents, for example, carry out data modification or The reason of deletion, the first identity of first terminal, data manipulation authorization mark, operation associated terminal identify (i.e. data Operate other business sides for being related to) etc. contents.
Step S20 is generated and the target keywords uniquely corresponding historical keyword and history value, the history value packet The operating instruction information of the target data is included, and according to the historical keyword and the modification operation/delete operation to area The historical record of block chain carries out record update;
In the present embodiment, server is performed to target data corresponding target value Value1 or target keywords Key1 After related amendments/delete operation, it will uniquely corresponding with target keywords Key1 according to the modification/delete operation generation one Historical keyword HistoryKey1, and be that historical keyword HistoryKey1 generation is corresponding according to deletion/modification operation It include this deletion/modification operation operation in history value HistoryValue1, operation history value HistoryValue1 Illustrate information, to record this deletion/modification operation details, such as action type, operating reason remarks, operator's mark The contents such as knowledge, authorization mark.Wherein, it for the generating process of historical keyword HistoryKey1, can be based on one Fixed algorithm (such as hash algorithm or other mapping rulers) carries out operation to target keywords Key1 and obtains.And for History value HistoryValue1 can be and be carried out by way of structural body in order to ensure the uniformity of information in block chain Setting.Specifically, server can be based on one initial configuration body of a preset recording rule creation, then grasped according to the modification Work/delete operation adds corresponding record character in the initial configuration body, to obtain corresponding 'historical structure body;Then it is The 'historical structure body can be determined as to the corresponding history value HistoryValue1 of historical keyword HistoryKey1.For example, should Initial configuration body can be
type History stuct{
Updater string
Action string
Info string
...
}
Wherein, Updater record operates the modification of target data;The delete operation of Action record target data; Info is recorded to target data modification/deletion remarks explanation;For Updater and Action, belong to the required item of alternative, It is to carry out the content of completion automatically according to data deletion/modification instruction by server (intelligent contract), and Info then can be Be configured according to the actual situation or according to first terminal send data modification/deletion instruction in include operating reason, The character string that the contents such as operating terminal mark (user identifier), data manipulation authorization mark are configured.For example, being wrapped in the Info Operating terminal mark is included, operating terminal mark also belongs to required item;Process is filled in for operating terminal mark, it can To be first terminal when sending data modification/deletion instruction, itself first can be added in the data modification/deletion instruction Identity;Server will extract the first identity therein when receiving data modification/deletion instruction;And it is creating Initial configuration body go forward side by side line character record when, can according to first identity initial mechanism body Info part record correspond to Operating terminal mark.In another example further including having operating reason in the Info, which belongs to choosing and fills out item;For the behaviour That makees reason fills in process, can be first terminal when sending data modification/deletion instruction, can be depending on the user's operation at this Relevant operating reason information is added in the instruction of data modification/deletion, and (the operating reason information can be with one section of character string Mode indicates, to reduce volume of transmitted data);Server will extract behaviour therein when receiving data modification/deletion instruction Make cause information;And when creation initial configuration body goes forward side by side line character record, it can be according to the operating reason information in initial mechanism The part Info of body records corresponding string content;If not including the operating reason information in certain modification/deletion instruction, Then server will not record the relevant character of operating reason in the part Info.
It is worth noting that for history value HistoryValue1, in addition to 'historical structure can also include other in vitro Content;And the form of structural body can also be configured according to the actual situation;The example above does not constitute the limit to this programme System.
In the present embodiment, server, will also going through to block chain itself after generating historical keyword and history value Record update is carried out in Records of the Historian record, more new content includes related amendments/delete operation pair for newly adding target keywords Key1 It should record, certain record may include the operating time;It can also include the corresponding historical keyword of target keywords Key1 HistoryKey1 (or being the contents such as the generating algorithm of HistoryKey1), to inquire the corresponding historical keyword of Key1 HistoryKey1。
Step S30, receive second terminal transmission based on the target keywords trace to the source inquiry instruction when, according to The inquiry instruction of tracing to the source inquires the historical record, and obtains the corresponding pass of the target keywords according to the historical record Key word record;
In the present embodiment, when a certain business participant needs to inquire the correlation circumstance of (tracing to the source) target data, Ke Yitong It crosses a certain service terminal and sends the inquiry instruction of tracing to the source based on target keywords Key1 to server (block chain node);Certainly In practice, modification/delete operation and to execute data operation of tracing to the source may not be to be held by the same server (block chain node) Row, but for convenience of explanation, it is illustrated for executing this two operations by the same server in the present embodiment.Wherein, it sends out The service terminal of the inquiry instruction of tracing to the source based on target keywords is given to can be described as second terminal.Server is being received based on mesh Mark keyword trace to the source inquiry instruction when, the inquiry instruction that can be traced to the source first according to this inquire block chain itself historical record, and The keyword record about target keywords Key1 is obtained from the historical record, to know target according to the keyword record The modification of keyword Key1/deletion situation.It is worth noting that can also be arranged certain in order to facilitate query history record Block chain query api interface, such as QueryHistory API, when the input of the api interface is keyword content, server is by root The keyword record inquired according to the input, and inquiry is obtained exports;It is whole by the way that the api interface is supplied to each business End, can facilitate each business side to be inquired, and provide convenience for each business side;And for server (block chain), also standardize The format for inquiry instruction of tracing to the source, facilitates carry out subsequent processing.It certainly, can also include other for the inquiry instruction of tracing to the source Content, such as the user identifier of inquiry, the contents such as data query authorization mark.
Step S40 obtains the historical keyword according to the keyword record and the target keywords, and according to institute Historical keyword is stated to inquire to obtain the history value;
In the present embodiment, server, can be according to the pass when obtaining the keyword record for target keywords Key1 Key word record judges the case where target keywords Key1 is with the presence or absence of modification/deletion;The case where modifying/deleting if it exists then will Corresponding historical keyword HistoryKey1 is obtained according to the keyword record and target keywords Key1, and according to the history Keyword HistoryKey1 inquires to obtain corresponding history value HistoryValue1;Again due to the history value HistoryValue1 includes that operating instruction information when target data is modified/deleted namely server have got number of targets According to the detailed operation information of modification/deletion.Certainly, the case where modifying/deleting if it does not exist, then server can directly basis be somebody's turn to do Target keywords Key1 obtains target value Value1, and target value Value1 is back to second terminal.
Step S50 returns to corresponding data to the second terminal according to the keyword record and the history value and traces back Source information.
In the present embodiment, for server when obtaining operation history value HistoryValue1, server can be according to key Word record and the operation history value HistoryValue1 return to corresponding data to second terminal and trace to the source information, with related service Side obtains the specifying information of target data.It traces to the source information, can be configured according to certain format, such as set for the data The data for being set to excel format are traced to the source file, and wherein every performance-based objective data of excel table are every time by modification/deletion phase Close record.
Further, it in order to preferably indicate the whereabouts of target data, traces to the source information, is can be with several for the data The mode that data changes record is indicated, and the dynamic record of these tables of data will be arranged in a manner of time flashback, from And business side is facilitated to check.Specifically, step S50 includes:
Corresponding data movement record, the data movement record are generated according to the keyword record and the history value Including changing the time;
For server when obtaining operation history value HistoryValue1, server can be according to keyword record and the behaviour Make history value HistoryValue1 and generate several datas variation records, wherein it includes corresponding change that every data, which changes record, Dynamic time, certain data movement record can also include other contents, such as change operator (namely cause it to change terminal, User), variation illustrates.
The data movement is recorded according to the variation time of the incremental data and is sorted in a manner of time flashback, and will Data movement record after sequence returns to the second terminal.
When obtaining these data movements record, these are counted the variation time in recording according to data movement by server It is sorted in a manner of time flashback according to record is changed.Such as the data movement record of certain target data includes a, b, c tri- altogether, according to Secondary is respectively " Updater 20180506adm1... ", " Updater20180308adm2... ", " Action 20180906adm1...";In these data movements record, " Updater " refers to that the modification to target data operates, " Action " refers to the delete operation to target data, and " 20180506 ", " 20180308 " and " 20180906 " are to change the time (year, month, day), " adm1 " and " adm2 " are the mark for changing operator;Server can be according to changing the time for this three data It changes record to sort in a manner of time flashback, after sequence are as follows:
Action 20180906 adm1...
Updater 20180506 adm1...
Updater 20180308 adm2...
After completing sequence, the data movement after sequence can be recorded and be back to second terminal by server, to facilitate industry Business side is checked.
In the present embodiment, in the data modification for receiving first terminal transmission/deletion instruction, repaired according to the data Change/delete the target keywords that instructions query corresponds to target data, and the execution of the target keywords corresponding target value is repaired Change operation/to the target keywords execute delete operation;It generates and the unique corresponding historical keyword of the target keywords And history value, the history value include the operating instruction information of the target data, and according to the historical keyword and described Modification operation/delete operation carries out record update to the historical record of block chain;Receive second terminal transmission based on institute State target keywords trace to the source inquiry instruction when, the historical record is inquired according to the inquiry instruction of tracing to the source, and according to described Historical record obtains the corresponding keyword record of the target keywords;According to the keyword record and the target keywords The historical keyword is obtained, and is inquired to obtain the history value according to the historical keyword;According to the keyword record Corresponding data are returned to the second terminal with the history value to trace to the source information.In the above manner, the present embodiment is to area Block chain data execute data modification or when delete operations, corresponding to increase the data with incidence relation, to as repairing Change or delete the historical information of tracing to the source of data;When needing to carry out data to trace to the source, it can be obtained and modified according to this associated data Or the concrete operations record of data has been deleted, to solve the information encountered when being traced to the source after data are modified or deleted Single-issue is realized to the detailed record of block chain data variation, meets the data record demand under block chain service application.
It further, is described in Fig. 2 in the data modification for receiving first terminal transmission/deletion instruction referring to Fig. 3, Fig. 3 When, the target keywords of target data are corresponded to according to the data modification/deletion instructions query, and to the target keywords pair The target value answered executes the refinement flow diagram that modification operated/executed to the target keywords delete operation.
Based on embodiment illustrated in fig. 2, in the present embodiment, step S10 includes:
Step S11 obtains the first terminal in the data modification for receiving first terminal transmission/deletion instruction First identity, and determine that the data modification/deletion instructs corresponding target data;
In view of block chain Information Security problem, the block chain in the present embodiment can also be to data modification/delete operation Certain permission limitation is carried out, different permissions can be set certainly for different block chain data and limit;And it is receiving When the data modification of first terminal/deletion instruction, also first the operating right of first terminal is judged, if the first terminal has There is relevant operation permission, just will do it modification/delete operation.Specifically, first terminal is sending data modification/deletion instruction Before, the first identity that first terminal itself can be added in the instruction of the data modification/deletion (or is the body of business side Part mark, operating right mark etc.) and need to modify/target keywords the Key1 of the target data of delete operation, then The data modification/deletion instruction is sent to server.Server refers in the data modification/deletion for receiving first terminal transmission When enabling, it will the first identity therein is extracted, to determine the identity of first terminal according to first identity;Together When, server will also extract the target keywords Key1 in data modification/deletion instruction, and true according to target keywords Key1 Determine data modification/deletion and instructs corresponding target data (operation object).
Step S12 judges whether the first terminal has for the target data according to first identity Data manipulation permission;
Server, can be according to first body in the first identity for obtaining first terminal and determining target data Part mark judges whether first terminal has the data manipulation permission for the target data.It, can be with for the process of the judgement It is that corresponding operating right table is provided with to Various types of data in advance in block chain, includes having in the operating right table to Various types of data There is the identity of relevant operation permission;Server can inquire the operating right table according to the first identity, to judge Whether one terminal has the data manipulation permission for the target data.
Step S13 refers to if the first terminal has the data manipulation permission according to the data modification/deletion The target keywords for inquiring the target data are enabled, and the execution of the target keywords corresponding target value is modified and is operated/right The target keywords execute delete operation.
When server determines that first terminal has the data manipulation permission for the target data, server is extractable should Target keywords Key1 in data modification/deletion instruction, and target keywords Key1 is inquired in block chain, then execute Corresponding operation: if data modification instructs, then it can further be inquired according to target keywords Key1 and obtain target pass The corresponding target value Value1 of key word Key1, and modify to target value Value1;If data delete instruction, then can be right Target keywords Key1 executes delete operation.And if server determines that first terminal does not have the data for the target data Operating right, then server will return to corresponding no operating right prompt to first terminal, and refuse to carry out data modification/deletion Operation.Above-mentioned setting data manipulation permission and operating right judgement by way of, can reduce block chain data by malicious modification/ The safety of block chain data storage can be improved in a possibility that deletion.
Further, the block chain in the present embodiment can also data modification/delete operation frequency to terminal (user) It is limited, to reduce a possibility that block chain data are frequently changed/delete.If specifically, the first terminal With the data manipulation permission, then target keywords of the target data according to the data modification/deletion instructions query, And to the corresponding target value of the target keywords execute modification operation/to the target keywords execute delete operation the step of Include:
If the first terminal has the data manipulation permission, described first is obtained according to first identity The terminal operation of terminal records, and determines that data of the first terminal in predetermined period are grasped according to terminal operation record Make number;
It is provided with relevant data operating record in the block chain of the present embodiment, includes each industry in the data operating record The data manipulation number for terminal of being engaged in and the time for carrying out data manipulation every time.Server is in the first body according to first terminal When part mark determines that first terminal has the data manipulation permission for the target data, it will also be looked into according to first identity The data operating record is ask, to obtain the terminal operation record of first terminal, and determines first according to terminal operation record Data manipulation number of the terminal in predetermined period, such as first terminal is in data manipulation number etc. originally in a few days.
Judge whether the data manipulation number is less than default secure threshold;
Server is when determining data manipulation number of the first terminal in predetermined period, it will judges the data manipulation time Whether number is less than default secure threshold, to judge the first terminal situation excessively frequent with the presence or absence of operation;And it is pre- for this If secure threshold, then can be configured according to the actual situation;Certainly for different service terminals (terminal identity mark), may be used also Different secure thresholds is arranged.
If the data manipulation number is less than the default secure threshold, looked into according to the data modification/deletion instruction The target keywords of the target data are ask, and the execution of the target keywords corresponding target value is modified and is operated/to described Target keywords execute delete operation.
If the data manipulation number is less than the default secure threshold, illustrate that the first terminal is excessively frequent there is no operating The case where, it is right at this time it is believed that relevant risk (or risk is lower) is not present in this data modification/delete operation of first terminal This server can extract the target keywords Key1 in the data modification/deletion instruction, and target pass is inquired in block chain Key word Key1, then executes corresponding operation:, then can be further according to target keywords Key1 if data modification instructs Inquiry obtains the corresponding target value Value1 of target keywords Key1, and modifies to target value Value1;If number It is instructed according to deleting, then can execute delete operation to target keywords Key1.And if the data manipulation is default more than or equal to this Secure threshold then illustrates that the first terminal has that operation is excessively frequent, at this time it is believed that this data of first terminal There are certain relevant risks for modification/delete operation, and it is excessively frequent that corresponding operation will be returned to first terminal to this server Prompt, and refuse to carry out data modification/delete operation.It is limited, can be reduced by the data manipulation frequency above to terminal Data frequent operation bring risk is conducive to the safety for improving the storage of block chain data.
Further, referring to Fig. 4, Fig. 4 be described in Fig. 2 receive second terminal transmission based on the target keywords Trace to the source inquiry instruction when, the historical record is inquired according to the inquiry instruction of tracing to the source, and obtain according to the historical record The refinement flow diagram of the corresponding keyword record of the target keywords.
Based on above-mentioned embodiment illustrated in fig. 2, in the present embodiment, step S30 includes:
Step S31, receive second terminal transmission based on the target keywords trace to the source inquiry instruction when, obtain Second identity of the second terminal judges whether the second terminal has for institute according to second identity State the search access right of tracing to the source of target data;
In view of block chain Information Security problem, the block chain in the present embodiment can also trace to the source data inquiry operation into The certain permission limitation of row, can be set different permissions certainly for different block chain data and limits;And receiving Two terminals trace to the source inquiry instruction when, also first the search access right of second terminal is judged, if the second terminal have correlation Search access right just will do it inquiry operation.Specifically, second terminal, before inquiry instruction is traced to the source in transmission, meeting is in the inquiry of tracing to the source In instruction add second terminal itself the second identity (or be the identity of business side, operating right mark Deng), then the data modification/deletion is instructed and is sent to server.Server is in the inquiry of tracing to the source for receiving second terminal transmission When instruction, it will the second identity therein is extracted, to determine the identity of second terminal according to second identity;So Server can judge whether second terminal has the search access right of tracing to the source for the target data according to second identity afterwards. For the process of the judgement, it can be in block chain and corresponding search access right table, inquiry power be provided with to Various types of data in advance It include the identity that there is relevant inquiring permission to Various types of data in limit table;Server can be inquired according to the second identity should Search access right table, to judge whether second terminal has the search access right of tracing to the source for the target data.
Step S32, if the second terminal has the search access right of tracing to the source, inquiry instruction of tracing to the source according to inquiry The historical record, and the corresponding keyword record of the target keywords is obtained according to the historical record.
When server determine second terminal have for the target data trace to the source search access right when, server can interrogation zone The historical record of block chain itself, and keyword record of the acquisition about target keywords Key1 from the historical record.And if taking Device of being engaged in determines that second terminal does not have the search access right of tracing to the source for the target data, then server will return pair to second terminal That answers prompts without search access right, and refuses to carry out record queries.The side judged by above-mentioned setting search access right and search access right Formula can reduce a possibility that important business data (private data) is revealed, and be conducive to the safety for improving the storage of block chain data. Certainly, in practice, for different data, different search access rights of tracing to the source can be correspondingly arranged.
It traces to the source device in addition, the embodiment of the present invention also provides a kind of data based on block chain.
Referring to Fig. 5, Fig. 5 is the functional module signal of device first embodiment of tracing to the source the present invention is based on the data of block chain Figure.
In the present embodiment, the data based on block chain device of tracing to the source includes:
Removing module 10 is modified, when for instructing in the data modification/deletion for receiving first terminal transmission, according to described Data modification/deletion instructions query corresponds to the target keywords of target data, and to the corresponding target value of the target keywords Execution modification operation/delete operation is executed to the target keywords;
Record update module 20, for generate with the target keywords uniquely corresponding historical keyword and history value, The history value includes the operating instruction information of the target data, and according to the historical keyword and the modification operation/ Delete operation carries out record update to the historical record of block chain;
First enquiry module 30, in the inquiry of tracing to the source based on the target keywords for receiving second terminal transmission When instruction, the historical record is inquired according to the inquiry instruction of tracing to the source, and the target is obtained according to the historical record and is closed The corresponding keyword record of key word;
Second enquiry module 40, for obtaining the history keyword according to the keyword record and the target keywords Word, and inquired to obtain the history value according to the historical keyword;
Information return module 50, for being returned pair according to the keyword record and the history value to the second terminal The data answered are traced to the source information.
Wherein, trace to the source each virtual functions module of device of the above-mentioned data based on block chain is stored in equipment shown in Fig. 1 In memory 1005, for realizing data trace to the source program institute it is functional;, it can be achieved that base when each module is executed by processor 1001 It traces to the source function in the data of block chain.
Further, the record update module 20 includes:
Keyword arithmetic element obtains the target for carrying out operation to the target keywords based on preset algorithm The unique corresponding historical keyword of keyword;
Structural body creating unit, for be based on preset recording rule creation initial configuration body, and according to the modification operate/ Delete operation adds corresponding record character in the initial configuration body, obtains corresponding 'historical structure body;
History value determination unit, for the 'historical structure body to be determined as the corresponding history value of the historical keyword.
Further, the modification removing module 10 includes:
Mark acquiring unit, for obtaining described the in the data modification for receiving first terminal transmission/deletion instruction First identity of one terminal, and determine that the data modification/deletion instructs corresponding target data;
First judging unit, for judging whether the first terminal has for described according to first identity The data manipulation permission of target data;
Unit is deleted in modification, if having the data manipulation permission for the first terminal, is repaired according to the data Change/delete the target keywords of target data described in instructions query, and the execution of the target keywords corresponding target value is repaired Change operation/to the target keywords execute delete operation.
Further, the modification removing module 10 further include:
First return unit, if not having the data manipulation permission for the first terminal, eventually to described first End returns to corresponding no operating right prompt.
Further, unit is deleted in the modification further include:
Number determines subelement, if having the data manipulation permission for the first terminal, according to described first Identity obtains the terminal operation record of the first terminal, and determines the first terminal according to terminal operation record Data manipulation number in predetermined period;
Number judgment sub-unit, for judging whether the data manipulation number is less than default secure threshold;
Subelement is deleted in modification, if being less than the default secure threshold for the data manipulation number, according to The target keywords of target data described in data modification/deletion instructions query, and to the corresponding target value of the target keywords Execution modification operation/delete operation is executed to the target keywords.
Further, first enquiry module 30 includes:
Second judgment unit, for referring in the inquiry of tracing to the source based on the target keywords for receiving second terminal transmission When enabling, the second identity of the second terminal is obtained, whether the second terminal is judged according to second identity With the search access right of tracing to the source for being directed to the target data;
Record queries unit is traced to the source according to and is looked into if having the search access right of tracing to the source for the second terminal Historical record described in instructions query is ask, and the corresponding keyword record of the target keywords is obtained according to the historical record.
Further, data information of tracing to the source includes data movement record, and the information return module 50 includes:
Record generation unit is remembered for generating corresponding data movement according to the keyword record and the history value Record, the data movement record includes changing the time;
Return unit is recorded, for recording to fall with the time by the data movement according to the variation time of the incremental data The mode chatted sorts, and the data movement record after sequence is returned to the second terminal.
Wherein, the above-mentioned data based on the block chain function of modules in device of tracing to the source is realized with above-mentioned based on block chain Data source tracing method embodiment in each step it is corresponding, function and realization process no longer repeat one by one here.
In addition, the embodiment of the present invention also provides a kind of readable storage medium storing program for executing.
It is stored with data on readable storage medium storing program for executing of the present invention to trace to the source program, wherein the data are traced to the source, program is held by processor When row, realize such as the step of the above-mentioned data source tracing method based on block chain.
Wherein, data program of tracing to the source is performed realized method and can refer to that the present invention is based on the data of block chain to trace to the source Each embodiment of method, details are not described herein again.
It should be noted that, in this document, the terms "include", "comprise" or its any other variant are intended to non-row His property includes, so that the process, method, article or the system that include a series of elements not only include those elements, and And further include other elements that are not explicitly listed, or further include for this process, method, article or system institute it is intrinsic Element.In the absence of more restrictions, the element limited by sentence "including a ...", it is not excluded that including being somebody's turn to do There is also other identical elements in the process, method of element, article or system.
The serial number of the above embodiments of the invention is only for description, does not represent the advantages or disadvantages of the embodiments.
Through the above description of the embodiments, those skilled in the art can be understood that above-described embodiment side Method can be realized by means of software and necessary general hardware platform, naturally it is also possible to by hardware, but in many cases The former is more preferably embodiment.Based on this understanding, technical solution of the present invention substantially in other words does the prior art The part contributed out can be embodied in the form of software products, which is stored in one as described above In storage medium (such as ROM/RAM, magnetic disk, CD), including some instructions are used so that terminal device (it can be mobile phone, Computer, server, air conditioner or network equipment etc.) execute method described in each embodiment of the present invention.
The above is only a preferred embodiment of the present invention, is not intended to limit the scope of the invention, all to utilize this hair Equivalent structure or equivalent flow shift made by bright specification and accompanying drawing content is applied directly or indirectly in other relevant skills Art field, is included within the scope of the present invention.

Claims (10)

1. a kind of data source tracing method based on block chain, which is characterized in that the data source tracing method packet based on block chain It includes:
In the data modification for receiving first terminal transmission/deletion instruction, according to the data modification/deletion instructions query pair The target keywords of target data are answered, and the execution of the target keywords corresponding target value is modified and is operated/to the target Keyword executes delete operation;
Uniquely corresponding historical keyword and history value, the history value include the number of targets with the target keywords for generation According to operating instruction information, and the history of block chain is remembered according to the historical keyword and the modification operation/delete operation Record carries out record update;
Receive second terminal transmission based on the target keywords trace to the source inquiry instruction when, according to the inquiry of tracing to the source Historical record described in instructions query, and the corresponding keyword record of the target keywords is obtained according to the historical record;
The historical keyword is obtained according to the keyword record and the target keywords, and according to the historical keyword Inquiry obtains the history value;
Corresponding data are returned to the second terminal according to the keyword record and the history value to trace to the source information.
2. as described in claim 1 based on the data source tracing method of block chain, which is characterized in that the generation and the target Uniquely corresponding historical keyword and the step of history value, include: keyword
Operation is carried out to the target keywords based on preset algorithm, obtains the target keywords uniquely corresponding history keyword Word;
Based on preset recording rule creation initial configuration body, and according to the modification operation/delete operation in the initial configuration Corresponding record character is added in body, obtains corresponding 'historical structure body;
The 'historical structure body is determined as the corresponding history value of the historical keyword.
3. as described in claim 1 based on the data source tracing method of block chain, which is characterized in that described to receive first eventually When holding the data modification/deletion instruction sent, closed according to the target that the data modification/deletion instructions query corresponds to target data Key word, and the execution of the target keywords corresponding target value is modified and is operated/delete operation is executed to the target keywords The step of include:
In the data modification for receiving first terminal transmission/deletion instruction, the first identity of the first terminal is obtained, And determine that the data modification/deletion instructs corresponding target data;
Judge whether the first terminal has the data manipulation power for the target data according to first identity Limit;
If the first terminal has the data manipulation permission, according to mesh described in the data modification/deletion instructions query The target keywords of data are marked, and the execution of the target keywords corresponding target value is modified and is operated/to the target critical Word executes delete operation.
4. as claimed in claim 3 based on the data source tracing method of block chain, which is characterized in that described according to first body After part mark judges whether the first terminal has the step of data manipulation permission for the target data, also wrap It includes:
If the first terminal does not have the data manipulation permission, corresponding no operating right is returned to the first terminal Prompt.
5. as claimed in claim 3 based on the data source tracing method of block chain, which is characterized in that if the first terminal With the data manipulation permission, then target keywords of the target data according to the data modification/deletion instructions query, And to the corresponding target value of the target keywords execute modification operation/to the target keywords execute delete operation the step of Include:
If the first terminal has the data manipulation permission, the first terminal is obtained according to first identity Terminal operation record, and the first terminal data manipulation in predetermined period time is determined according to terminal operation record Number;
Judge whether the data manipulation number is less than default secure threshold;
If the data manipulation number is less than the default secure threshold, according to the data modification/deletion instructions query institute The target keywords of target data are stated, and the execution of the target keywords corresponding target value is modified and is operated/to the target Keyword executes delete operation.
6. as described in claim 1 based on the data source tracing method of block chain, which is characterized in that described to receive second eventually End send based on the target keywords trace to the source inquiry instruction when, the history is inquired according to the inquiry instruction of tracing to the source and is remembered Record, and the step of keyword record corresponding according to the historical record acquisition target keywords includes:
Receive second terminal transmission based on the target keywords trace to the source inquiry instruction when, obtain the second terminal The second identity, judge whether the second terminal has for the target data according to second identity It traces to the source search access right;
If the second terminal has the search access right of tracing to the source, inquiry instruction of tracing to the source according to inquires the history note Record, and the corresponding keyword record of the target keywords is obtained according to the historical record.
7. such as the data source tracing method described in any one of claims 1 to 6 based on block chain, which is characterized in that the number It include data movement record according to information of tracing to the source,
It is described corresponding data are returned to the second terminal according to the keyword record and the history value to trace to the source information Step includes:
Corresponding data movement record is generated according to the keyword record and the history value, the data movement record includes Change the time;
The data movement is recorded according to the variation time of the incremental data and is sorted in a manner of time flashback, and will sequence Data movement record afterwards returns to the second terminal.
The device 8. a kind of data based on block chain are traced to the source, which is characterized in that the data based on block chain are traced to the source device packet It includes:
Removing module is modified, for being repaired according to the data in the data modification for receiving first terminal transmission/deletion instruction Change/delete the target keywords that instructions query corresponds to target data, and the execution of the target keywords corresponding target value is repaired Change operation/to the target keywords execute delete operation;
Record update module, for generate with the target keywords uniquely corresponding historical keyword and history value, it is described to go through History value includes the operating instruction information of the target data, and is grasped according to the historical keyword and the modification operation/deletion Work carries out record update to the historical record of block chain;
First enquiry module, in the inquiry instruction of tracing to the source based on the target keywords for receiving second terminal transmission When, the historical record is inquired according to the inquiry instruction of tracing to the source, and the target keywords are obtained according to the historical record Corresponding keyword record;
Second enquiry module, for obtaining the historical keyword according to the keyword record and the target keywords, and It is inquired to obtain the history value according to the historical keyword;
Information return module, for returning to corresponding number to the second terminal according to the keyword record and the history value According to information of tracing to the source.
The equipment 9. a kind of data based on block chain are traced to the source, which is characterized in that the data based on block chain are traced to the source equipment packet It includes processor, memory and is stored on the memory and the program that can be traced to the source by the data that the processor executes, wherein The data trace to the source program when being executed by the processor, realize as described in any one of claims 1 to 7 based on block chain Data source tracing method the step of.
10. a kind of readable storage medium storing program for executing, which is characterized in that it is stored with data on the readable storage medium storing program for executing and traces to the source program, wherein The data trace to the source program when being executed by processor, and realize the number based on block chain as described in any one of claims 1 to 7 The step of according to source tracing method.
CN201910377821.XA 2019-05-07 2019-05-07 Data source tracing method, device, equipment and readable storage medium storing program for executing based on block chain Pending CN110263015A (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN201910377821.XA CN110263015A (en) 2019-05-07 2019-05-07 Data source tracing method, device, equipment and readable storage medium storing program for executing based on block chain
PCT/CN2019/121719 WO2020224247A1 (en) 2019-05-07 2019-11-28 Blockchain–based data provenance method, apparatus and device, and readable storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910377821.XA CN110263015A (en) 2019-05-07 2019-05-07 Data source tracing method, device, equipment and readable storage medium storing program for executing based on block chain

Publications (1)

Publication Number Publication Date
CN110263015A true CN110263015A (en) 2019-09-20

Family

ID=67914365

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910377821.XA Pending CN110263015A (en) 2019-05-07 2019-05-07 Data source tracing method, device, equipment and readable storage medium storing program for executing based on block chain

Country Status (2)

Country Link
CN (1) CN110263015A (en)
WO (1) WO2020224247A1 (en)

Cited By (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110597840A (en) * 2019-09-26 2019-12-20 腾讯科技(深圳)有限公司 Partner relationship establishing method, device, equipment and storage medium based on block chain
CN110765205A (en) * 2019-10-12 2020-02-07 中思博安科技(北京)有限公司 Block chain based metadata management method, system and computer storage medium
CN111368325A (en) * 2020-02-24 2020-07-03 北京阿尔山金融科技有限公司 Service information processing method and device and electronic equipment
WO2020224247A1 (en) * 2019-05-07 2020-11-12 深圳壹账通智能科技有限公司 Blockchain–based data provenance method, apparatus and device, and readable storage medium
CN111930753A (en) * 2020-09-15 2020-11-13 腾讯科技(深圳)有限公司 Data retrieving method and device, electronic equipment and storage medium
CN112286881A (en) * 2020-10-28 2021-01-29 金蝶云科技有限公司 Document authentication and tracing method and device
CN112417178A (en) * 2020-11-24 2021-02-26 从法信息科技有限公司 On-chain contract processing method and device based on document template definition and electronic equipment
CN113010906A (en) * 2021-04-12 2021-06-22 福建省海峡信息技术有限公司 Credible data tracing method and system based on block chain
CN113836503A (en) * 2021-08-10 2021-12-24 中标慧安信息技术股份有限公司 Internet of things data modification state recording method and system based on block chain
CN113918622A (en) * 2021-10-22 2022-01-11 南京理工大学 Information tracing method and system based on block chain

Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20160267474A1 (en) * 2015-03-13 2016-09-15 First Data Corporation Systems and methods for securing digital gift cards with a public ledger
CN107391735A (en) * 2017-08-04 2017-11-24 北京明朝万达科技股份有限公司 Business datum source tracing method, device, system and storage device based on block chain
CN107622096A (en) * 2017-08-31 2018-01-23 上海保险交易所股份有限公司 Asynchronous multiparty data exchange method and storage medium based on block catenary system
CN108304724A (en) * 2018-01-25 2018-07-20 中国地质大学(武汉) Document is traced to the source device, system and method
CN108449336A (en) * 2018-03-16 2018-08-24 浙江创邻科技有限公司 Data traceability based on block chain and strong encryption method, apparatus, medium and system
US20180284093A1 (en) * 2017-03-29 2018-10-04 Innit International S.C.A. Trusted Food Traceability System and Method and Sensor Network
CN108628942A (en) * 2018-03-27 2018-10-09 深圳市网心科技有限公司 The digital independent and wiring method of block chain node device, distributed data base
CN109165224A (en) * 2018-08-24 2019-01-08 东北大学 A kind of indexing means being directed to keyword key on block chain database
CN109684305A (en) * 2018-12-22 2019-04-26 复旦大学 A kind of encyclopaedia entry management system and implementation method based on block chain

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110263015A (en) * 2019-05-07 2019-09-20 深圳壹账通智能科技有限公司 Data source tracing method, device, equipment and readable storage medium storing program for executing based on block chain

Patent Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20160267474A1 (en) * 2015-03-13 2016-09-15 First Data Corporation Systems and methods for securing digital gift cards with a public ledger
US20180284093A1 (en) * 2017-03-29 2018-10-04 Innit International S.C.A. Trusted Food Traceability System and Method and Sensor Network
CN107391735A (en) * 2017-08-04 2017-11-24 北京明朝万达科技股份有限公司 Business datum source tracing method, device, system and storage device based on block chain
CN107622096A (en) * 2017-08-31 2018-01-23 上海保险交易所股份有限公司 Asynchronous multiparty data exchange method and storage medium based on block catenary system
CN108304724A (en) * 2018-01-25 2018-07-20 中国地质大学(武汉) Document is traced to the source device, system and method
CN108449336A (en) * 2018-03-16 2018-08-24 浙江创邻科技有限公司 Data traceability based on block chain and strong encryption method, apparatus, medium and system
CN108628942A (en) * 2018-03-27 2018-10-09 深圳市网心科技有限公司 The digital independent and wiring method of block chain node device, distributed data base
CN109165224A (en) * 2018-08-24 2019-01-08 东北大学 A kind of indexing means being directed to keyword key on block chain database
CN109684305A (en) * 2018-12-22 2019-04-26 复旦大学 A kind of encyclopaedia entry management system and implementation method based on block chain

Cited By (15)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2020224247A1 (en) * 2019-05-07 2020-11-12 深圳壹账通智能科技有限公司 Blockchain–based data provenance method, apparatus and device, and readable storage medium
CN110597840B (en) * 2019-09-26 2023-09-22 腾讯科技(深圳)有限公司 Partner relationship establishment method, device, equipment and storage medium based on blockchain
CN110597840A (en) * 2019-09-26 2019-12-20 腾讯科技(深圳)有限公司 Partner relationship establishing method, device, equipment and storage medium based on block chain
CN110765205A (en) * 2019-10-12 2020-02-07 中思博安科技(北京)有限公司 Block chain based metadata management method, system and computer storage medium
CN111368325A (en) * 2020-02-24 2020-07-03 北京阿尔山金融科技有限公司 Service information processing method and device and electronic equipment
CN111930753A (en) * 2020-09-15 2020-11-13 腾讯科技(深圳)有限公司 Data retrieving method and device, electronic equipment and storage medium
CN112286881A (en) * 2020-10-28 2021-01-29 金蝶云科技有限公司 Document authentication and tracing method and device
CN112286881B (en) * 2020-10-28 2024-04-05 金蝶云科技有限公司 Document authentication tracing method and device
CN112417178A (en) * 2020-11-24 2021-02-26 从法信息科技有限公司 On-chain contract processing method and device based on document template definition and electronic equipment
CN112417178B (en) * 2020-11-24 2022-09-30 从法信息科技有限公司 Document template definition-based on-chain contract processing method and device and electronic equipment
CN113010906B (en) * 2021-04-12 2023-10-27 福建省海峡信息技术有限公司 Trusted data tracing method and system based on blockchain
CN113010906A (en) * 2021-04-12 2021-06-22 福建省海峡信息技术有限公司 Credible data tracing method and system based on block chain
CN113836503A (en) * 2021-08-10 2021-12-24 中标慧安信息技术股份有限公司 Internet of things data modification state recording method and system based on block chain
CN113918622A (en) * 2021-10-22 2022-01-11 南京理工大学 Information tracing method and system based on block chain
CN113918622B (en) * 2021-10-22 2022-04-19 南京理工大学 Information tracing method and system based on block chain

Also Published As

Publication number Publication date
WO2020224247A1 (en) 2020-11-12

Similar Documents

Publication Publication Date Title
CN110263015A (en) Data source tracing method, device, equipment and readable storage medium storing program for executing based on block chain
US11093631B2 (en) Data access authority management method, apparatus, terminal device and storage medium
CN107506462B (en) Data processing method and system for enterprise-level data, electronic equipment and storage medium
CN110399373A (en) A kind of block chain account book storage system, storage querying method and delet method
CN109118353B (en) Data processing method and device of wind control model
CN101901242A (en) Federated configuration data management
CN108733713A (en) Data query method and device in data warehouse
CN104572122A (en) Software application data generating device and method
CN107798038A (en) Data response method and data response apparatus
CN105956087A (en) Data and code version management system and method
CN106251114B (en) Method and device for realizing approval in application
CN104252454B (en) A kind of data permission control method and system towards cloud computing multi-tenant pattern
CN111124917A (en) Public test case management and control method, device, equipment and storage medium
CN109005058A (en) A kind of intelligence system control platform and management-control method
CN108197903A (en) A kind of relation information processing method and processing device in enterprise
CN112115276A (en) Intelligent customer service method, device, equipment and storage medium based on knowledge graph
CN115238247A (en) Data processing method based on zero trust data access control system
CN113918149A (en) Interface development method and device, computer equipment and storage medium
KR101365481B1 (en) System for generating and managing a portal for program management
CN104239212A (en) Query method and device of test case and establishment method and device of test case
CN111782889A (en) Alloy material data sharing method, system and equipment based on block chain
CN115543428A (en) Simulated data generation method and device based on strategy template
Delavar et al. ERPASD: A novel algorithm for integrated distributed reliable systems using data mining mechanisms
US11106637B2 (en) Metadata-driven tiered storage
CN109637645A (en) Medical information management method, electronic equipment and storage medium based on cloud computing

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
WD01 Invention patent application deemed withdrawn after publication
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20190920